Securing Lte Networkswhat Why and How
Securing Lte Networkswhat Why and How
White Paper
byF5
WHITE PAPER
SecuringLTENetworksWhat,Why,andHow
Introduction
Service providers are faced with a number of complex challenges today as they seek to evolve and future-proof their
networks to accommodate increasing network trafc, massive scaling requirements, virtualization and orchestration
needs, cost controls, and expansion into new revenue sources.
At the same time, operators are experiencing security incidents and attacks resembling those that Internet service
providers have been experiencing for years. Network congestion, service degradation or complete outage, and exposure
of user information and signaling messages are serious concerns. Core network elements and support infrastructure are
more prone to outside threats than ever before. Advanced persistent threats (APTs), distributed denial-of-service (DDoS)
attacks, and DNS-level attacks threaten network and service availability and performance. Ensuring the security,
performance, and availability of high-speed mobile networks is thus of critical importance to both the service providers
who own and operate them and their subscribers. Furthermore, it is now critical to protect the network itself as well as
the consumer devices connected to it.
F5s carrier-grade security solutions protect both the long-term evolution (LTE) network and its subscribers from the
threats they face today. These solutions can provide service providers with security in a changing landscape, safeguard
their brand reputations, protect against next-generation attacks, and enable expansion into new revenue sources.
SecuringLTENetworksWhat,Why,andHow
With more than two thirds of online adults using free, unsecured public WiFi services, the security threat becomes
obvious. As Bryan Sartin, director at Verizon Business, states, In two years, more data will be stolen from mobile devices
than from servers and applications.
Another risk to consider in addition to malicious attacker trafc is chatty applications and the load they can generate on
signaling and ancillary support systems. With a single connection request for popular applications, including mail, news,
and social media, often producing 30 or more connection and signaling events, the potential for millions of subscriber
devices to overload service provider signaling and support infrastructure is also a very real concern. If it's not designed
and built with sufcient capacity and security, there is signicant potential for a small number of bad actors to disrupt the
carriers signalling and support infrastructure.
The threat landscape targeting consumers and their devices also continues to evolve. With the increasing variety and
sophistication of threat vectors, including social engineering, malware, DDoS attacks, and more, it is now becoming
critical for modern LTE network operators to protect their clients from potential attacks in order to protect themselves.
Figure 1: Network security is critical to ensure positive customer experience and protable growth.
By protecting the network itself, operators can improve the quality of experience (QoE) provided by the network to
subscribers, thus protecting both existing and new services the network supports. This in turn will protect operators
from subscriber churn and declines in average revenue per user (ARPU). Thus by strengthening the security of the
network, operators may boost overall revenues and reduce their total cost of ownership (TCO).
Figure 1: Network security is critical to ensure positive customer experience and protable growth.
By protecting the network itself, operators can improve the quality of experience (QoE) provided by the network to
WHITE PAPER
subscribers, thus protecting both existing and new services the network supports. This in turn will protect operators
SecuringLTENetworksWhat,Why,andHow
from subscriber churn and declines in average revenue per user (ARPU). Thus by strengthening the security of the
network, operators may boost overall revenues and reduce their total cost of ownership (TCO).
Figure 2: Mobile networks may be attacked from many sources at multiple locations.
Device-level attacks, which may be caused by malware or bots infecting subscribers devices, can generate spurious or
attack trafc, create signaling storms into the network, and drain device batteries. The network itself may be subject to
radio access network (RAN) and core network resource exhaustion, terms and conditions (T&C) violations, and attacks
on DNS, billing, and signaling infrastructure. Additionally, attacks targeted at the application layer may include server-side
malware, application-level (protocol-specic) DDoS attacks, or layer 7, web application level threats.
All these risk factors must be considered for the operator to ensure stable and secure network operation, to protect the
infrastructure, and to protect and satisfy customers. More specically, operators must put controls and security policies
into place in multiple domains to protect each aspect of the mobile network.
attack trafc, create signaling storms into the network, and drain device batteries. The network itself may be subject to
radio access network (RAN) and core network resource exhaustion, terms and conditions (T&C) violations, and attacks
on DNS, billing, and signaling infrastructure. Additionally, attacks targeted at the application layer may include server-side
malware, application-level (protocol-specic) DDoS attacks, or layer 7, web application level threats.
WHITE
All thesePAPER
risk factors must be considered for the operator to ensure stable and secure network operation, to protect the
SecuringLTENetworksWhat,Why,andHow
infrastructure, and to protect and satisfy customers. More specically, operators must put controls and security policies
into place in multiple domains to protect each aspect of the mobile network.
To protect the network fully requires a policy of true multi-layer, multi-domain security. Security at the mobile device, air
interface, access network, core networkand also at the applications, operational support systems (OSS), and business
support systems (BSS)must all be protected. Until all of these layers are secure, operators face the risk of attack via
multiple, evolving threat vectors.
All types of attackif successfulwill decrease customer satisfaction and increase operator costs, so it is critical to both
understand the risks and develop an end-to-end mitigation strategy.
Figure 4: Devices may be attacked from the Internet side of the mobile network.
Figure 5: Devices also may be attacked from the mobile side of the network.
As with an Internet-side attack, this attack also potentially could cause multiple problems, including:
1. Mobile device battery drain.
2. Data volume use leading to billing complaints.
3. RAN connection exhaustion.
WHITE PAPER
SecuringLTENetworksWhat,Why,andHow
Figure 5: Devices also may be attacked from the mobile side of the network.
As with an Internet-side attack, this attack also potentially could cause multiple problems, including:
1. Mobile device battery drain.
2. Data volume use leading to billing complaints.
3. RAN connection exhaustion.
Figure 6: Intensive DNS and signaling attacks can originate from a mobile device.
services, including security, on a unied platform. The F5 platform enables service providers to decrease time to market,
reduce capital and operating costs, improve service delivery performance and security, and monetize network services.
F5s service provider solution set is composed of solutions for security, network functions virtualization (NFV), data trafc
management, and Diameter and DNS signaling. All F5 solutions are available either on purpose-built, high-performance
physical hardware platforms or on a variety of virtual or cloud platforms. In addition, management and orchestration for
these solutions is available via the F5 BIG-IQ management platform as well as APIs from each product.
As networks continue to grow and scale massively, the characteristics of the trafc running on them also evolve, leading
to a greater number of TCP connections, with shorter and more frequent connections becoming dominant. The
implication of this evolution of application trafc is that the service provider network now requires infrastructure solutions
that support very high TCP connection scaling. Legacy security solutions cant scale and dont deliver the performance
needed for modern, high-performance networks and applications; they will not be sufcient to deliver security,
performance, and reliability in todays environment.
Virtual or overlay networks and virtualized network services, as used to create over-the-top (OTT) or wholesale network
services also create another level of complexity as scalability requirements increase and new services and applications
with strict latency requirements are run across these networks.
All of this transformation drives the critical requirement for security and trafc management solutions that can deliver
massive scale and high performance. F5 solutions, which do both, are perfectly suited to these new service and
operating environments.
network infrastructure. Using the security platforms of BIG-IP AFM and BIG-IP ASM at peering junctions protects both
the network infrastructure and mobile customers against attacks from roaming network partners.
Finally, OSS and BSS systems, including subscriber databases, DNS, and other signaling and charging systems within
the operators network can be protected against attack from rogue employees or Internet and mobile threats by BIG-IP
WHITE PAPER
AFM, BIG-IP DNS, and the F5 Trafx Signaling Delivery Controller (SDC). F5 also offers a full suite of management
SecuringLTENetworksWhat,Why,andHow
and orchestration options for next-generation architectures like SDN and NFV, including northbound APIs and the BIG-
IQ management platform.
Figure 7: The suite of F5 carrier-grade solutions can ensure comprehensive security from the core network to user devices.
In short, F5 offers comprehensive service provider security solutions that can secure:
1. Subscriber mobile devices.
2. The data layer of the S/Gi network itself, as well as data center and peering connections.
3. The access network for both wireless and wireline connections.
4. The signalling layer with the Trafx SDC plus BIG-IP DNS services.
5. Applications for the virtualed network functions (VNFs) within the data center.
All of the above services can be matched end-to-end across the network and enforced with a consistent set of policies.
Finally, DDoS protection can be delivered across all layers of the network, on all BIG-IP hardware or virtual edition
platforms.
platforms.
Maintain service provider security in a changing landscape. F5 offers service providers a comprehensive,
SecuringLTENetworksWhat,Why,andHow
security solution with massive scalability, programmability, and extensibility.
Simplify. Since all the above functions (except the Trafx SDC) are available on a single BIG-IP platform, an
operator can collapse and simplify its data center infrastructure and network operations, thus reducing CapEx,
OpEx, and TCO.
Protect the service providers brand. F5 security solutions t within a single service delivery architecture that
delivers a proactive security posture and optimal experiences for subscribers.
Secure against next-generation attacks. F5 security solutions provide service providers with a highly scalable
platform that enables superior throughput, connection rates, and concurrent sessions while protecting against the
next generation of attacks.
Secure expansion into new revenue sources. F5 protects and ensures availability of service provider networks
and application infrastructure under the most demanding conditions, empowering secure delivery of new network
applications and services that drive revenue growth.
Conclusion
Service providers primary concern continues to be protecting all their critical network infrastructure from attacks, but
user equipment attacks are now also rmly within the scope of concern. While in the past some service providers may
have categorized attacks on mobile devices as being outside the realm of their responsibilities, most now fully
understand the potential harm of those attacks, and that they must have tools to prevent these incidents from
occurring.
Compounding the service providers challenge to ensure end-to-end security for all service delivery is that the line
between user equipment attacks and network element attacks continues to blur. This drives the need for service
providers to implement a scalable, advanced, and comprehensive security framework that protects their networks and
customers while providing tools and capabilities to address new sophisticated threats as they emerge. Implementing a
strong security posture is now more critical than ever, and mobile service providers can best secure their evolving LTE
networks with the extensive service provider security capabilities that only F5 can provide.
Learn more about the F5 service provider solution set at f5.com/solutions/service-provider.
F5 Networks, Inc.
401 Elliott Avenue West, Seattle, WA 98119
888-882-4447 www.f5.com
Americas
[email protected]
Asia-Pacific
[email protected]
Europe/Middle-East/Africa
[email protected]
Japan
[email protected]
2016 F5 Networks, Inc. All rights reserved. F5, F5 Networks, and the F5 logo are trademarks of F5 Networks, Inc. in the U.S. and in certain other countries. Other F5
trademarks are identified at f5.com. Any other products, services, or company names referenced herein may be trademarks of their respective owners with no
endorsement or affiliation, express or implied, claimed by F5. WP-SP-69001128-lte-security 0113